A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR Data

被引:0
|
作者
Prosanta Gope
Ruhul Amin
机构
[1] Singapore University of Technology and Design,iTrust, Centre for Research in Cyber Security
[2] Thapar university,Department of Computer Science & Engineering
来源
Journal of Medical Systems | 2016年 / 40卷
关键词
EPHR; Access control; Break-the-glass; RBAC; Mac;
D O I
暂无
中图分类号
学科分类号
摘要
Electronic Patient Health Record (EPHR) systems may facilitate a patient not only to share his/her health records securely with healthcare professional but also to control his/her health privacy, in a convenient and easy way even in case of emergency. In order to fulfill these requirements, it is greatly desirable to have the access control mechanism which can efficiently handle every circumstance without negotiating security. However, the existing access control mechanisms used in healthcare to regulate and restrict the disclosure of patient data are often bypassed in case of emergencies. In this article, we propose a way to securely share EPHR data under any situation including break-the-glass (BtG) without compromising its security. In this regard, we design a reference security model, which consists of a multi-level data flow hierarchy, and an efficient access control framework based on the conventional Role-Based Access Control (RBAC) and Mandatory Access Control (MAC) policies.
引用
收藏
相关论文
共 50 条
  • [41] Multi-attribute-Based Access Control Policy for Supply Chain Data Service
    ZOU Junwei
    LAN Jiewei
    WANG Xiaoke
    LUO Hong
    Chinese Journal of Electronics, 2018, 27 (06) : 1283 - 1290
  • [42] A Novel Role-based Access Control Model in Cloud Environments
    Jun Luo
    Hongjun Wang
    Xun Gong
    Tianrui Li
    International Journal of Computational Intelligence Systems, 2016, 9 : 1 - 9
  • [43] A Novel Role-based Access Control Model in Cloud Environments
    Luo, Jun
    Wang, Hongjun
    Gong, Xun
    Li, Tianrui
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2016, 9 (01) : 1 - 9
  • [44] A Novel Watermark-Based Access Control Model for Digital Imagines
    Chen, Yan
    Jiang, Wenting
    Kang, Zhongmiao
    CLOUD COMPUTING AND SECURITY, PT VI, 2018, 11068 : 267 - 276
  • [45] An access control model for medical big data based on clustering and risk
    Jiang, Rong
    Han, Shanshan
    Yu, Yimin
    Ding, Weiping
    INFORMATION SCIENCES, 2023, 621 : 691 - 707
  • [46] A Framework for Situation-Aware Access Control in Federated Data-as-a-Service Systems Based on Query Rewriting
    Oni, Samson
    Chen, Zhiyuan
    Crainiceanu, Adina
    Joshi, Karuna P.
    Needham, Don
    2020 IEEE 13TH INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2020), 2020, : 1 - 11
  • [47] A Universal Model for Policy-Based Access Control-enabled Ubiquitous Computing
    Jing, Yixin
    Kim, Jinhyung
    Jeong, Dongwon
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2006, 2 (01): : 28 - 33
  • [48] Cascading Permissions Policy Model for Token-Based Access Control in the Web of Things
    Amir, Mohammad
    Pillai, Prashant
    Hu, Yim-Fun
    2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, : 238 - 245
  • [49] An Enhanced Identity Authentication Security Access Control Model Based on 802.1x Protocol
    Chen, Han-Ying
    Liu, Xiao-Li
    FUZZY SYSTEMS AND DATA MINING II, 2016, 293 : 407 - 413
  • [50] Improving Web Applications Security Using Path-Based Role Access Control Model
    Kononov, Dmitry
    Isaev, Sergey
    PROCEEDINGS OF THE 2018 3RD RUSSIAN-PACIFIC CONFERENCE ON COMPUTER TECHNOLOGY AND APPLICATIONS (RPC), 2018,